{"id":"https://openalex.org/W2066863194","doi":"https://doi.org/10.1109/icc.2012.6364760","title":"A game theoretic investigation for high interaction honeypots","display_name":"A game theoretic investigation for high interaction honeypots","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2066863194","doi":"https://doi.org/10.1109/icc.2012.6364760","mag":"2066863194"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2012.6364760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6364760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015467879","display_name":"Osama Hayatle","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Osama Hayatle","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QUE, Canada","Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049846737","display_name":"Hadi Otrok","orcid":"https://orcid.org/0000-0002-9574-5384"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hadi Otrok","raw_affiliation_strings":["Electrical and Computer Engineering Department, Khalifa University of Science, Technology and Research, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Khalifa University of Science, Technology and Research, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr Youssef","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QUE, Canada","Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015467879"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.73024411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"6662","last_page":"6667"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9947572946548462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6978425979614258},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.664421021938324},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6237742304801941},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4993422031402588},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.4247239828109741},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09121441841125488}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9947572946548462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6978425979614258},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.664421021938324},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6237742304801941},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4993422031402588},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.4247239828109741},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09121441841125488},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2012.6364760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6364760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1529945719","https://openalex.org/W2106287567","https://openalex.org/W2114339651","https://openalex.org/W2128031609","https://openalex.org/W2132280055","https://openalex.org/W2138525936","https://openalex.org/W2151584216","https://openalex.org/W2171770082","https://openalex.org/W2204500561","https://openalex.org/W3123790715","https://openalex.org/W4239223658","https://openalex.org/W4239874534","https://openalex.org/W6631772966","https://openalex.org/W6678722026","https://openalex.org/W6679886283","https://openalex.org/W6680544035"],"related_works":["https://openalex.org/W178168142","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W2956011222","https://openalex.org/W2352475565","https://openalex.org/W4385187164","https://openalex.org/W2742579858","https://openalex.org/W4313484479","https://openalex.org/W2070407907"],"abstract_inverted_index":{"Honeypots":[0],"are":[1,189],"traps":[2,16,46],"designed":[3,78],"to":[4,11,20,43,55,63,79,111,130,191,213,218],"resemble":[5],"easy-to-compromise":[6],"computer":[7],"systems":[8],"in":[9,101,128],"order":[10,129],"deceive":[12],"botmasters.":[13,92,151,224],"Such":[14],"security":[15,18,211],"help":[17],"professionals":[19,212],"collect":[21],"valuable":[22],"information":[23],"about":[24],"botmasters'":[25,194],"techniques":[26],"and":[27,108,167,197],"true":[28],"identities.":[29],"Depending":[30],"on":[31],"the":[32,91,94,116,120,126,135,145,163,180,193,201],"complexity":[33],"of":[34,51,147,221],"services":[35],"provided":[36],"by":[37,47,73,90,99,125,150,210,223],"honeypots,":[38,57],"botmasters":[39,58,168],"might":[40],"be":[41,88,208],"able":[42],"detect":[44,56],"these":[45,82,219],"performing":[48],"a":[49,156,170],"series":[50],"tests.":[52],"In":[53,140,152],"particular,":[54,153],"can":[59,86,207],"command":[60],"compromised":[61],"machines":[62,71],"perform":[64],"specific":[65],"actions":[66],"such":[67,102],"as":[68,169],"targeting":[69],"sensor":[70],"controlled":[72],"them.":[74],"If":[75],"honeypots":[76,100,166],"were":[77],"completely":[80],"ignore":[81],"commands,":[83],"then":[84],"they":[85],"easily":[87],"detected":[89],"On":[93],"other":[95],"hand,":[96],"full":[97],"participation":[98],"activities":[103],"has":[104],"its":[105,132],"associated":[106],"costs":[107],"may":[109],"lead":[110],"legal":[112],"liabilities.":[113],"This":[114],"raises":[115],"need":[117],"for":[118,184],"finding":[119],"optimal":[121,181],"response":[122,182,217],"strategy":[123],"needed":[124],"honeypot":[127,148],"prolong":[131],"stay":[133],"within":[134],"botnet":[136],"without":[137],"sacrificing":[138],"liability.":[139],"this":[141],"paper,":[142],"we":[143,154],"address":[144],"problem":[146],"detection":[149],"present":[155],"Bayesian":[157],"game":[158,173,177,202],"theoretic":[159],"framework":[160],"that":[161],"models":[162],"interaction":[164],"between":[165,200],"non-zero-sum":[171],"noncooperative":[172],"with":[174],"uncertainty.":[175],"The":[176,204],"solution":[178],"illustrates":[179],"available":[183],"both":[185],"players.":[186,203],"Simulation":[187],"results":[188,206],"conducted":[190],"show":[192],"behavior":[195],"update":[196],"possible":[198],"interactions":[199],"obtained":[205],"utilized":[209],"determine":[214],"their":[215],"best":[216],"kind":[220],"probes":[222]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
